Podcast
Questions and Answers
What is the main purpose of network security?
What is the main purpose of network security?
- To eliminate all internet access
- To reduce the cost of network maintenance
- To protect vital information while allowing access to authorized users (correct)
- To make networks faster
Which of the following describes a firewall?
Which of the following describes a firewall?
- A system that allows unrestricted access to network resources
- Software that only protects wireless networks
- An access control mechanism limiting communication based on rules (correct)
- A device that completely blocks all incoming and outgoing traffic
What is one potential drawback of using a firewall?
What is one potential drawback of using a firewall?
- Creates a single point of access that can become a target (correct)
- Eliminates the need for all other security measures
- Automatically updates security protocols without intervention
- Increases network speed significantly
What form of authentication can be used to improve network security?
What form of authentication can be used to improve network security?
What do packet filtering firewalls primarily do?
What do packet filtering firewalls primarily do?
Which of the following is NOT a common security attack mentioned?
Which of the following is NOT a common security attack mentioned?
Which statement about firewalls is incorrect?
Which statement about firewalls is incorrect?
How is the reliability of resource availability typically guaranteed in a secure network?
How is the reliability of resource availability typically guaranteed in a secure network?
What is the purpose of well-known port numbers?
What is the purpose of well-known port numbers?
Which of the following protocols uses TCP port 22?
Which of the following protocols uses TCP port 22?
What type of attack is characterized by overloading a server to make a network service unusable?
What type of attack is characterized by overloading a server to make a network service unusable?
Which of the following best describes a dictionary attack?
Which of the following best describes a dictionary attack?
What is a key characteristic of packet sniffing?
What is a key characteristic of packet sniffing?
Which protocol is commonly used to secure HTTP communications?
Which protocol is commonly used to secure HTTP communications?
What might be a common tactic employed in social engineering attacks?
What might be a common tactic employed in social engineering attacks?
Which service commonly uses TCP port 80?
Which service commonly uses TCP port 80?
What is the primary function of well-known port numbers in a network?
What is the primary function of well-known port numbers in a network?
Which of the following ports is associated with the Hypertext Transfer Protocol (HTTP)?
Which of the following ports is associated with the Hypertext Transfer Protocol (HTTP)?
What is a characteristic of a denial of service attack?
What is a characteristic of a denial of service attack?
How does packet sniffing primarily compromise network security?
How does packet sniffing primarily compromise network security?
Which of the following protocols is commonly used to secure IP communications?
Which of the following protocols is commonly used to secure IP communications?
What role do Intrusion Detection Systems (IDS) serve in network security?
What role do Intrusion Detection Systems (IDS) serve in network security?
Which port is typically used for Secure Shell (SSH) connections?
Which port is typically used for Secure Shell (SSH) connections?
What does a dictionary attack exploit to gain unauthorized access?
What does a dictionary attack exploit to gain unauthorized access?
What is a potential threat posed by social engineering?
What is a potential threat posed by social engineering?
Which type of attack relies on creating false IP packets that rely on destination address alone?
Which type of attack relies on creating false IP packets that rely on destination address alone?
What is a primary concern of network security?
What is a primary concern of network security?
What type of firewall filters packets based on predefined rules?
What type of firewall filters packets based on predefined rules?
Which of the following is a primary function of firewalls?
Which of the following is a primary function of firewalls?
Why is it important to keep firewalls up to date?
Why is it important to keep firewalls up to date?
What characterizes Denial of Service (DoS) attacks?
What characterizes Denial of Service (DoS) attacks?
What is an example of access control in network security?
What is an example of access control in network security?
Which system might incorporate a built-in firewall function?
Which system might incorporate a built-in firewall function?
What type of information should be protected by network security measures?
What type of information should be protected by network security measures?
What is one potential risk of having only one point of access into a network as provided by a firewall?
What is one potential risk of having only one point of access into a network as provided by a firewall?
Which of the following best describes packet sniffing?
Which of the following best describes packet sniffing?
What is a key benefit of using firewalls in a network?
What is a key benefit of using firewalls in a network?
Which of the following is a drawback of firewalls in network security?
Which of the following is a drawback of firewalls in network security?
What differentiates packet filtering firewalls from other types?
What differentiates packet filtering firewalls from other types?
Which of these is primarily targeted in Social Engineering attacks?
Which of these is primarily targeted in Social Engineering attacks?
What is a common characteristic of Denial of Service (DoS) attacks?
What is a common characteristic of Denial of Service (DoS) attacks?
What is the role of intrusion detection systems (IDS) in network security?
What is the role of intrusion detection systems (IDS) in network security?
How do firewalls maintain their effectiveness over time?
How do firewalls maintain their effectiveness over time?
Which communication protocols typically rely on port numbers for their operation?
Which communication protocols typically rely on port numbers for their operation?
What type of attack involves monitoring network traffic to capture unencrypted data, such as passwords?
What type of attack involves monitoring network traffic to capture unencrypted data, such as passwords?
Which of the following port numbers is associated with the Post Office Protocol (POP3)?
Which of the following port numbers is associated with the Post Office Protocol (POP3)?
What is the main purpose of a Denial of Service (DoS) attack?
What is the main purpose of a Denial of Service (DoS) attack?
Which protocol is commonly associated with TCP port 443 for secure web communications?
Which protocol is commonly associated with TCP port 443 for secure web communications?
Which type of social engineering involves tricking individuals into revealing sensitive information?
Which type of social engineering involves tricking individuals into revealing sensitive information?
What can be a consequence of a successful dictionary attack?
What can be a consequence of a successful dictionary attack?
What is one method for securing data transmitted over the Internet to prevent packet sniffing?
What is one method for securing data transmitted over the Internet to prevent packet sniffing?
What type of monitoring system is designed to detect suspicious activity on a network?
What type of monitoring system is designed to detect suspicious activity on a network?
Flashcards
Port Numbers
Port Numbers
Unique numbers that identify specific services on a computer.
TCP Ports
TCP Ports
Specific port numbers used for Transmission Control Protocol (TCP) services.
Intrusion Detection
Intrusion Detection
Monitoring for suspicious activity on a network using known patterns.
Dictionary Attack
Dictionary Attack
Signup and view all the flashcards
Denial-of-Service (DoS) attack
Denial-of-Service (DoS) attack
Signup and view all the flashcards
Packet Sniffing
Packet Sniffing
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
HTTPS
HTTPS
Signup and view all the flashcards
Network Security
Network Security
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Packet Filtering Firewall
Packet Filtering Firewall
Signup and view all the flashcards
Denial-of-Service Attack
Denial-of-Service Attack
Signup and view all the flashcards
TCP Attack (Spoofing)
TCP Attack (Spoofing)
Signup and view all the flashcards
Network Ports
Network Ports
Signup and view all the flashcards
What are port numbers?
What are port numbers?
Signup and view all the flashcards
What's the purpose of well-known ports?
What's the purpose of well-known ports?
Signup and view all the flashcards
How is a port associated with an IP address?
How is a port associated with an IP address?
Signup and view all the flashcards
What is a TCP port?
What is a TCP port?
Signup and view all the flashcards
What is a UDP port?
What is a UDP port?
Signup and view all the flashcards
What is a dictionary attack?
What is a dictionary attack?
Signup and view all the flashcards
How does a Denial of Service (DoS) attack work?
How does a Denial of Service (DoS) attack work?
Signup and view all the flashcards
What is packet sniffing?
What is packet sniffing?
Signup and view all the flashcards
What is social engineering?
What is social engineering?
Signup and view all the flashcards
What is SSL/HTTPS?
What is SSL/HTTPS?
Signup and view all the flashcards
Network Security: Why?
Network Security: Why?
Signup and view all the flashcards
Firewall: What is it?
Firewall: What is it?
Signup and view all the flashcards
Firewall: How does it work?
Firewall: How does it work?
Signup and view all the flashcards
Firewall: What does it protect against?
Firewall: What does it protect against?
Signup and view all the flashcards
TCP Spoofing: What is it?
TCP Spoofing: What is it?
Signup and view all the flashcards
Packet Sniffing: What is it?
Packet Sniffing: What is it?
Signup and view all the flashcards
Social Engineering: What is it?
Social Engineering: What is it?
Signup and view all the flashcards
Network Ports: What are they?
Network Ports: What are they?
Signup and view all the flashcards
Transmission Control Protocol (TCP) & UDP Ports
Transmission Control Protocol (TCP) & UDP Ports
Signup and view all the flashcards
HTTPS: What is it?
HTTPS: What is it?
Signup and view all the flashcards
Intrusion Detection: What is it?
Intrusion Detection: What is it?
Signup and view all the flashcards
Dictionary Attack: What is it?
Dictionary Attack: What is it?
Signup and view all the flashcards
Authentication: What is it?
Authentication: What is it?
Signup and view all the flashcards
Access Control: What is it?
Access Control: What is it?
Signup and view all the flashcards
What is network security?
What is network security?
Signup and view all the flashcards
Why do we need network security?
Why do we need network security?
Signup and view all the flashcards
TCP Spoofing
TCP Spoofing
Signup and view all the flashcards
What do port numbers do?
What do port numbers do?
Signup and view all the flashcards
What is an IP address?
What is an IP address?
Signup and view all the flashcards
What is TCP?
What is TCP?
Signup and view all the flashcards
What is UDP?
What is UDP?
Signup and view all the flashcards
What is a DoS Attack?
What is a DoS Attack?
Signup and view all the flashcards
Study Notes
International & Access Foundation Programmes
- Computer Science Module, Semester 2, Part 5: Networks - Network Security
Overview
- What is network security?
- Why is network security needed?
- Who is vulnerable?
- Common security attacks and countermeasures
- Firewalls & Intrusion Detection Systems
- Denial of Service Attacks
- TCP Attacks (Spoofing)
- Packet Sniffing
- Social Engineering
Why do we need security?
- Protect vital information while allowing access to those who need it
- Trade secrets, medical records, personal data etc.
- Provide authentication and access control for resources
- Login, Passwords, Biometrics
- Guarantee availability of resources
- Uptime 99.995% reliability
Firewalls
-
Basic problem: many network applications and protocols have security problems that are fixed over time
-
Difficult for users to keep up with changes and keep host secure
-
Solution: Administrators limit access to end hosts by using a firewall
- Firewall is kept up-to-date by administrators
-
Firewall is like a castle with a drawbridge: only one point of access into the network
- This can have positives and negatives
- Can be hardware or software
- Some routers come with firewall functionality
- Unix systems, Windows XP/7/8 and Mac OS X have built-in software firewalls
-
Diagram shows the firewall's position between the Internet and Intranet, with a DMZ (Demilitarized Zone) in between for servers.
- Data flows from Internet, through a Firewall, then to the DMZ, and to the Intranet.
-
Used to filter packets based on rules
-
These are called packet filtering firewalls
-
There are other types too, but they will not be discussed.
-
Windows 7 default installation shows specific open ports.
Ports
- In the internet protocol suite, a port is an endpoint of communication in an operating system
- 1024 well-known port numbers are reserved to identify specific service types on a host
- A port is always associated with an IP address of a host
- Examples include:
http://www.example.com:8080
,http://72.56.123.233:80/
- List of registered ports
Typical TCP Ports
- 21: File Transfer Protocol (FTP)
- 22: Secure Shell (SSH)
- 23: Telnet remote login service
- 25: Simple Mail Transfer Protocol (SMTP)
- 53: Domain Name System (DNS) service
- 80: Hypertext Transfer Protocol (HTTP) – used in the World Wide Web
- 110: Post Office Protocol (POP3)
- 119: Network News Transfer Protocol (NNTP)
- 123: Network Time Protocol (NTP)
- 143: Internet Message Access Protocol (IMAP)
- 161: Simple Network Management Protocol (SNMP)
- 194: Internet Relay Chat (IRC)
- 443: HTTP Secure (HTTPS)
Types of Attack
- Intrusion Detection
- Used to monitor for "suspicious activity" on a network.
- Based on well-known patterns of behavior.
- Dictionary Attack - Brute Force
- Dictionary attack on passwords.
- Denial of Service
- Makes a network service unusable by overloading the server or network.
- TCP Attacks
- Create IP packets and routers process them based on destination address alone
- End hosts may lie about other fields which do not affect delivery
- Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source.
- Packet Sniffing
- Affects any broadcast-based medium (cable, wifi, etc.)
- A host listens to the data (plain text data – passwords).
- Solution: encrypt the data using Secure Sockets Layer (SSL) for https addresses
- Web browsers know how to trust HTTPS websites based on certificate authorities.
- IPSec - Internet Protocol Security (a protocol suite for securing Internet communications by authenticating and encrypting IP packets).
- Social Engineering
- People can be just as dangerous as unprotected computer systems.
- People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable information.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.